scholarly journals Opportunistic mobile social networks: architecture, privacy, security issues and future directions

Author(s):  
Vimitha R. Vidhya Lakshmi ◽  
Gireesh Kumar T.

Mobile Social Networks and its related applications have made a very great impact in the society. Many new technologies related to mobile social networking are booming rapidly now-a-days and yet to boom. One such upcoming technology is Opportunistic Mobile Social Networking. This technology allows mobile users to communicate and exchange data with each other without the use of Internet. This paper is about Opportunistic Mobile Social Networks, its architecture, issues and some future research directions. The architecture and issues of Opportunistic Mobile Social Networks are compared with that of traditional Mobile Social Networks. The main contribution of this paper is regarding privacy and security issues in Opportunistic Mobile Social Networks. Finally, some future research directions in Opportunistic Mobile Social Networks have been elaborated regarding the data's privacy and security.

2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Ruijun Duan ◽  
Li Guo

As a disruptive emerging technology, the Internet of things (IoT) has rapidly developed, but its privacy risks and security vulnerabilities are still key challenges. The decentralized and distributed architecture of blockchain has the potential to satisfy IoT privacy and security requirements. This gives birth to the new domain of blockchain for IoT (BIoT). BIoT will cause significant transformations across several industries, paving the way for new business models. Based on the Science Citation Index Expanded (SCIE) and Social Sciences Citation Index (SSCI) databases in Web of Science (WoS) Core Collection, this study aims to explore the research trends and cooperation in the field of BIoT using the bibliometric method. The results indicate that the publications in this field have increased significantly from 2016 to 2020, with China and the USA being the most productive and influential countries. Keyword co-occurrence analysis shows that the most important research topics are as follows: security issues, core technologies, application dimensions, and transaction processes. Text mining analysis indicates that future research directions for BloT will focus more on both computing paradigms and key applications. This study will provide researchers with a greater understanding on the state of the art of BIoT and will serve as a reference for researchers engaging in this field to identify their own future research directions.


Author(s):  
Lori N.K. Leonard ◽  
Tracy S. Manly

Social networking sites are prevalent among young adults. College students in particular are utilizing these sites to keep in contact with friends and to make new friends. However, with the positives of social networking, there are also negatives. Students can provide too much personal information online, engage in inappropriate conversations, scrutinize other students, ridicule peers, and so forth. Because of the impersonal environment that technology creates, an individual’s normal behavior can change which leads to a change in his/her basic ethical structure. The purpose of this chapter is to provide a discussion of the changing ethical structure of students, as well as an examination of the ways to teach ethics, given those changes. The chapter also includes a discussion of four classical ethical theories that should be considered when discussing or teaching social networking. Future research directions are also given.


2015 ◽  
Vol 17 (3) ◽  
pp. 1557-1581 ◽  
Author(s):  
Xiping Hu ◽  
Terry H. S. Chu ◽  
Victor C. M. Leung ◽  
Edith C.-H. Ngai ◽  
Philippe Kruchten ◽  
...  

2020 ◽  
pp. 0032258X2096858
Author(s):  
Alexander E Carter ◽  
Mariea Hoy ◽  
Betsy Byrne DeSimone

Despite law enforcement’s best efforts to use social media as a means of community policing, some engagement tactics may lead citizens to disclose personally identifiable information (PII). We coded 200 tweets with the popular #9PMRoutine that tagged @PascoSheriff (Florida) for participant PII. We found numerous postings of adults’ and children’s PII that are problematic including pictures, health information and security-related comments about their routines or vacations. Implications for law enforcement to protect their communities are discussed as well as opportunities to continue to cultivate their online relationships in a more secure forum. We also provide future research directions.


2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


2013 ◽  
Vol 5 (1) ◽  
pp. 69-73 ◽  
Author(s):  
Sanjeev Kulkarni ◽  
Kirna Kumari ◽  
Naheeda Kittur

Future shopping applications collect basic profile information of the person and provide great service on recommending books, electronics and other products based on user profile, previous shopping history and relationships between the items categories derived from purchases of all the users on the site. E.g. if someone is looking at action movies it can recommend similar category or a category that the shopper is likely to be associated with. The mining of user's profile greatly enhances a person's shopping experience on modern online shops. The main purpose of this paper is solving the privacy and security issues.


Author(s):  
Sylvaine Castellano ◽  
Insaf Khelladi

New opportunities and challenges are emerging thanks to the growing Internet importance and social media usage. Although practitioners have already recognized the strategic dimension of e-reputation and the power of social media, academic research is still in its infancy when it comes to e-reputation determinants in a social networks context. A study was conducted in the sports setting to explore the impact of social networks on the sportspeople's e-reputation. Whereas the study emphasized (1) the influence of social networks' perception on the sportspeople's e-reputation, and the neutral roles of (2) the motives for following sportspeople online, and (3) the negative content on the Internet, additional insights are formulated on maintaining, restoring and managing e-reputation on social networks. Finally, future research directions are suggested on the role of image to control e-reputation.


2014 ◽  
Vol 10 (2) ◽  
pp. 78-95 ◽  
Author(s):  
Karen Smith ◽  
Francis Mendez ◽  
Garry L. White

A model is developed and tested to explain the relationships among narcissism, privacy concern, vigilance, and exposure to risk on Facebook, with age and gender as controlling variables. Two important constructs are conceptualized and measured in this research. Facebook exposure is defined as the opportunity for privacy and security breaches on Facebook. Facebook vigilance is the extent to which consumers stay focused, attentive, and alert to potential security and privacy risks on Facebook by restricting who can access and post to their Facebook accounts. Data from a survey of 286 adult Facebook users in the U.S. support the hypothesized relationships in the model. Results suggest that narcissism is related to increased Facebook exposure and lower Facebook vigilance, despite greater stated concern for privacy and security. Furthermore, females and younger users have greater risk exposure compared to males and older users. Implications of the findings and future research directions are discussed.


Sign in / Sign up

Export Citation Format

Share Document